The Modified Gaussian Function based RED (MGF-RED) Algorithm for Congestion Avoidance in Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "The Modified Gaussian Function based RED (MGF-RED) Algorithm for Congestion Avoidance in Mobile Ad Hoc Networks"

Transcription

1 The Modified Gaussian Function based RED (MGF-RED) Algorithm for Congestion Avoidance in Mobile Ad Hoc Networks Makul Mahajan Student, Dept. of CSE Amritsar College of Engineering & Technology PTU, Jalandhar, Punjab Tanu Preet Singh, Ph.D Professor and HOD, Dept. of ECE Amritsar College of Engineering and Technology, PTU, Jalandhar, Punjab ABSTRACT In this paper the idea is to rationale a new active queue management technique (MGF-RED) based on Random Early Detection (RED), a well known active queue management technique for congestion avoidance. The conventional RED uses the concept of minimum threshold, maximum threshold and average queue length. If the average queue length increases by minimum threshold then the algorithm start dropping the packets with some probability using linear function of average queue size. If the average queue size is greater than the maximum threshold then packets are dropped with 1 probability. The proposed algorithm will use Modified Gaussian function for calculating the likelihood of packet drop as the average queue length increases the minimum threshold. Simulation has been performed using NS The simulation results show that the proposed algorithm will present better network performance in throughput, packet delivery fraction and number of dropped packets. General Terms MANET, RED, Gaussian Function. 1. INTRODUCTION A Mobile Ad Hoc network consists of various data transmission mobile nodes that can forward the packet from one node to another node. There is no permanent infrastructure in mobile ad hoc network. Communication between the nodes takes place by the mean of wireless links [1]. Due to this property of mobile ad hoc network, the network can be setup at any time and at anywhere. As the nodes in this type of network are mobile therefore the topology is highly dynamic. The topology of the mobile ad hoc network depends upon the mobility of nodes. If mobility is high then topology of the network changes very rapidly [2][3]. Fig 1: A Mobile Ad Hoc Network with 6 Nodes Another feature of mobile ad hoc network is that it can perfectly be used in military applications as setting up this type of network is cost effective and takes less time[2] [3]. The one of the challenge in Mobile ad hoc network is providing the QOS. Each device in MANET has some buffer space provided that can store packets arriving at the queue if the packet cannot be transferred instantaneously [4]. If the queue becomes full, then it leads to congestion hence packet starts dropping. Several techniques are used for avoiding the congestion in the network. Active Queue Management (AQM) [9] is one of the techniques used for managing the buffer space. Another technique that is used for managing the queue space in network is drop tail technique [11], which is passive queue management technique. In drop tail technique the packets are dropped once the queue become full. Drop tail mechanism of queue management suffers from the problem of global synchronization. RED [10] (Random Early Detection) technique is used for managing the queue actively which provides a competence of early congestion by dropping/marking (if ECN is active) the packets as the queue size increases by some threshold. This system reduces the packet loss rate and increases throughput of the network [3][4][5]. Although RED provides a solution for active queue management but the function used in RED algorithm for calculating the probability of dropping the packets when queue size increases by some minimum threshold is linear function of queue average length. Hence the packet loss rate increases as the queue average length increases [4] [5]. So, the work is to propose a function that does not increases linearly with average queue size. In this paper the main objective is to propose a new Active queue management technique based on modified Gaussian function named MGF-RED. The proposed algorithm will use modified Gaussian function for dropping the packets when the average queue length increases above minimum threshold instead of linear function. The result shows that the proposed algorithm outperforms the traditional RED. 2. RELATED WORK In [4], the authors have discussed the limitation of drop tail queue and proposed a RED with ECN scheme that increases throughput by 10%. In [5], the authors have proposed a new active queue management technique named as adaptive RED based on traditional RED algorithm. In [6], a new improved RED algorithm is proposed that uses packet delay and queue length for calculating the probability of packet drop. In [7], the author has proposed a new fuzzy controller based RED algorithm that is an improvement on traditional RED 39

2 algorithm. In [8], a new AQM algorithm named as PERED is proposed to improve router performance in term of stability of queue size and packet drop. 3. CONVENTIONAL RED ALGORITHM One practice that is used for managing the queue in MANET is Drop Tail Queue [11]. In drop tail technique the algorithm start dropping the packets when the queue becomes full. Drop tail actually work on the principle of FIFO queue in which packets are coming one by one and leave the queue at another end. But if the queue size becomes full then it start dropping the packet hen there is no technique of early congestion notification [4] [8]. Random Early Detection (RED) [10] is well known technique used for active queue management and for congestion avoidance in computer networks [6][7].RED algorithm is sensitive on following parameters: Average Queue Length (avg_len) Minimum Threshold (minth) Maximum Threshold (maxth) Maximum Drop Probability (maxp) RED Algorithm first calculates the average queue length and then it compares the average queue length with the minimum and maximum threshold. [4] [8] If the average queue length (avg_len) is less the minimum threshold then no packet is dropped. If average queue length is greater than minimum threshold(minth) then it checks if average queue length is less than maximum threshold(maxth) then packet drop probability is calculated using the below stated formula: P=v_a*avg_len+v_b (1) Where v_a and v_b are constants and are given by: v_a= 1/maxthresh-minthresh. v_b=minthresh/(maxthresh-minthresh). Avg_len is queue average length. If the average queue length is greater than maximum threshold then packets are always dropped until queue length reaches the value less than maxthresh. Following is the basic algorithm used in RED. 1. estimate average queue length (avg_len) 2. if avg_len <minth then, enque the packet i.e. No drop. else if avg_len> minth and avg_len<maxth than, Calculate drop probability using linear function of avg_len. 3. Exit. else if avg_len>maxth then, Drop the packet always. One of the main advantage of using RED over other techniques like Drop Tail, it early detects the congestion before becoming burst. Due to this the queue length can be controlled and hence reduces the packet drop ratio. However from the survey of RED it has observed that the RED algorithm has problem such as low throughput and unfairness to connections. Secondly the packet drop Probability function used in RED is a linear function of average queue length i.e. as the average queue size increases the probability of packet drop also increases[6] [8]. So This paper has proposed a new modified Gaussian based RED which distributes the probability symmetrically rather than linearly. The simulation results show that the proposed modified Gaussian RED outperforms the traditional RED. 4. PROPOSED ALGORITHM (MODIFIED GAUSSIAN RED) This section presents a new active queue management technique named modified Gaussian RED. From the above discussion it is observed that there is a need of work on linear function which is used for calculating the probability of packet dropping when the average queue length exceeds the minimum threshold but less than maximum threshold [5] [8]. After studying the various probability functions it is decided to include a modified Gaussian function for calculating the probability of packet dropping. Hence the proposed packet dropping probability function is given by: P=a*v_a -x +d (2) Where x= (avg_len-b) 2 /2c 2 avg_len is the average queue size and is given by: avg_len= q_len*w and w is the queue weight and is constant value provided at the time of simulation. Where P is new packet drop probability v_a and v_b are constant and are given by v_a=1/maxth-minth v_b=minth/maxth-minth a=cos 2 (theta) + sin 2 (theta) b=-sin (2*theta) + sin (2*theta) c=sin 2 (theta) + cos 2 (theta) theta= v_a*avg_len+v_b. In the proposed algorithm as the packet came, the algorithm calculates the average queue length first. Then the average queue length is compared with the minimum and maximum threshold and work in the following steps: Step 1: calculate the average queue length Step 2: if average queue length< minimum threshold then Enque the packet Step 3: if average queue length is > minimum thresholds and < Maximum threshold then Calculate packet drop probability using above equation (Modified Gaussian probability). Step 4: if average queue length> maximum threshold then Drop the packet. Step 5: Exit 40

3 The Proposed Flowchart is: The following figure shows the proposed method: Case A: An Empty Queue Case B: Avg_que< (No Drop) Case C: Avg_que> and < (Drop with modified Gaussian probability) Case D: Avg_que> (Drop the packet until queue become less than ) Fig: 3 Proposed Mechanisms Fig 2: Proposed Flowchart In the proposed flowchart as shown in figure 2 instead of using the linear function for calculating the probability of packet drop we are using the modified Gaussian function. The modified Gaussian function used for calculating the packet drop probability is a symmetric function. It distributes the probability symmetrically rather than linearly. Hence when the congestion is there the probability of dropping the packet does not increase linearly with the average queue length hence fewer packets are dropped and network performance is improved. The proposed algorithm as shown in figure 2 for congestion avoidance is the modified version of conventional RED algorithm. In the proposed algorithm when the packet arrives algorithm calculate the average queue length. Then the average queue length is compared with the minimum threshold. If it is less than minimum threshold then packet is processed. If it is more than minimum threshold then compare it with maximum threshold. If average queue length is greater than minth and less than maxth then packet drop probability is calculated using modified Gaussian probability function instead of linear function. If the avg_len is greater than maximum threshold then packet is dropped always. In short, the objective is to include a new probability function named modified Gaussian probability function for calculating the packet drop probability. The simulation results shows that the proposed algorithm gives increased throughput, increased packet delivery fraction and decreased number.. 41

4 5. SIMULATION SCENARIO The simulation has been performed using NS In the simulation AODV protocol has been taken as foundation. Initially the procedure calculates the throughput, PDF and End to End delay for RED algorithm then the same procedure is repeated for the modified Gaussian function based RED i.e. the proposed algorithm. The simulation results shows that the proposed algorithm give the better network recital in requisites of throughput, PDF and delay. In the simulation comparison of existing algorithm with the proposed algorithm has been done. The simulation parameters taken are: Table 1 Parameter Routing Protocol Number of Nodes 30 Pause Time Value AODV 6s Area 800 *800 m 2 Speed Packet Size Simulation Time Traffic Pattern Mobility Model 1000 m/s 1000b 60s CBR Random Way Point Model The following parameters of RED algorithm need to be set in TCL scripts while executing the conventional and proposed RED algorithm while performing the simulation: Minimum threshold: 15 Maximum Threshold: 45 Queue weight: Maximum drop probability: 0.05 Simulation has been performed by taking the above stated simulation parameters. The trace files have been generated by simulating the scenario and with the help of XGRAPH and AWK files results are formulated. 6. RESULTS AND DISCUSSION The results have been obtained by using the NS-2.34 simulator and results shows that our proposed algorithm performs better than traditional RED algorithm in term of throughput, packet delivery ratio and packet drop rate. Throughput It may be defined as the total amount of data received by destination from the source node divided by time taken to receive the last packet. Figure 4 shows the Simulation Time (X-Axis) versus Throughput (Y-Axis) of MGF-RED and RED. It has been clear from the figure that the proposed algorithm gives the higher throughput than the Traditional RED. The simulation is carried out for 60sec and it has been observed from the results that the proposed algorithm gives a throughput of and RED gives the throughput of Fig 4: Throughput versus simulation time. 42

5 Packet Delivery Ratio It the total number of packets received by destination to total number of packet sent by source. Figure 5 shows the simulation time (X-Axis) versus packet delivery ratio (Y- Axis) of MGF-RED and RED. The figure 5 shows that the proposed algorithm gives the higher packet delivery ratio than the traditional RED. After 60 sec of simulation, the packet delivery fraction is also increased from (RED) to (MGF-RED). Fig 5: Packet Delivery Fraction versus simulation time Packet Dropped It may be defined as the total number of sent and forwarded packets minus the received packets. Figure 6 shows the simulation time (X-Axis) versus packet dropped (Y-Axis) of MGF-RED and RED algorithm. The figure 6 shows that the proposed algorithm drops less number of packets than the traditional RED algorithm. For the same simulation time i.e. 60sec the number of packets dropped is also less in our proposed algorithm which is 3477 in MGF- RED and 3501 and in RED. Fig 6: Number of Packet Dropped Versus Simulation Time 43

6 7. CONCLUSION This paper have proposed a new active queue management technique named as modified Gaussian function based random early detection algorithm (MGF-RED). The traditional RED calculates the packet drop probability based on linear function. In this algorithm the probability of packet drop increases as the average queue size increases. The propose work will generate a new probability function based on modified Gaussian probability function for calculating the packet drop probability. Simulations have been carried out and results shows that the proposed technique gives higher throughput, packet delivery fraction and lower number of dropped packets. In future the proposed work can be implemented for varying network load. 8. REFERENCES [1] Geethu Mohandas, D. S. (2013). Survey on Routing Protocols on Mobile Adhoc. IEEE (pp ). IEEE. [2] Bhabani Sankar Gouda, A. K. (2013). A Comprehensive Performance Analysis of Energy Efficient Routing Protocols in different traffic based Mobile Ad-hoc Networks. (pp ). IEEE. [3] HUAIZHI LI, M. S. (2007). ABRP: Anchor-based Routing Protocol for Mobile Ad Hoc Networks. Wireless Personal Communications (Springer) 2006, [4] Jeetendra Kumar Patel, J. D. (2012). Mobile Ad hoc Network Performance Improvement Using Strategical RED. IEEE. [5] Rahul Verma, A. I. (2003). Active Queue Management using Adaptive RED. JOURNAL OF COMMUNICATIONS AND NETWORKS, [6] Sarita Simaiya, A. S. (2013). Performance Improvement of MANET by IRED. Journal of Environmental Science, Computer Science and Engineering & Technology, [7] Hussein Abdel-jaber, M. M. (2008). Fuzzy Logic Controller of Random Early Detection based on Average Queue Length and Packet Loss Rate. SPECTS, (pp ). [8] Cao Zhen-zhen, X. Y. (2006). PERED:A New AQM Algorithm. ICWMMN. [9] S. Athuraliya, S. Low, V. Li, and Q. Yin, REM: Active queue management, IEEE Network Magazine, vol. 15, pp , May [10] Floyd, Sally, Jacobson, Random Early Detection (RED) gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking 1 (4): doi: / August [11] Ganesh Patil,Sally McClean and Gaurav Raina. Drop tail and RED queue management with small buffers: Stability and hopf bifurcation. ICTACT journal on communication technology, june [12] Guan-Yi Su, C. C.Random Early Detection Improved by Progressive Adjustment Method. Proceedings of IEEE th National Conference on Telecommunication Technologies and IEEE nd Malaysia Conference on Photonics, August 2008, Putrajaya, Malaysia (pp ). IEEE. IJCA TM : 44

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs I J C T A, 9(41), 2016, pp. 157-164 International Science Press ISSN: 0974-5572 The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs Makul Mahajan 1 and Mritunjay Kumar

More information

Implementation of Hybrid Modified RED Algorithm for Congestion Avoidance in MANETS

Implementation of Hybrid Modified RED Algorithm for Congestion Avoidance in MANETS Implementation of Hybrid Modified RED Algorithm for Congestion Avoidance in MANETS Akshatha R 1, Vedananda D. E 2 1 Lecturer, SRNMN College of Applied Sciences, Shivamogga 2 Assistant professor, JNN College

More information

AVC College of Engineering, Mayiladuthurai, India

AVC College of Engineering, Mayiladuthurai, India Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation

More information

Effective Utilization of Router Buffer by Threshold Parameter Setting Approach in RED

Effective Utilization of Router Buffer by Threshold Parameter Setting Approach in RED Effective Utilization of Router Buffer by Threshold Parameter Setting Approach in RED Kiran Chhabra Research Scholar Computer Science & Engineering Dr. C. V. Raman University, Bilaspur (C. G.) Manali Kshirsagar

More information

Applying Fuzzy Logic Principles to Improve the Performance of the Random Early Detection Algorithm

Applying Fuzzy Logic Principles to Improve the Performance of the Random Early Detection Algorithm Applying Fuzzy ogic Principles to Improve the Performance of the Random Early Detection Algorithm A. I. A. Jabbar, PhD Professor Department of Electrical Engineering osul University Ahmed I. Al-Ghannam.Sc.

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Three-section Random Early Detection (TRED)

Three-section Random Early Detection (TRED) Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion

More information

British Journal of Science 18 September 2012, Vol. 6 (2) Keywords: MANET, Queuing process, Queuing mechanisms, simulation

British Journal of Science 18 September 2012, Vol. 6 (2) Keywords: MANET, Queuing process, Queuing mechanisms, simulation British Journal of Science 18 Queuing Approach to Model the MANETs Performance Assist Prof. Dr. Saad Talib Hasson Head of Computer Sciences Department University of Babylon- College of Sciences IRAQ Enass

More information

Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model

Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model Rakesh K Scholar (M.Tech) The Oxford College of Engineering Bangalore Mrs. Kalaiselvi Asst. Prof,

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

RED Tuning for TCP Performance on the Mobile Ad Hoc Networks

RED Tuning for TCP Performance on the Mobile Ad Hoc Networks RED Tuning for TCP Performance on the Mobile Ad Hoc Networks Shin-Jer Yang and Yung-Chieh Lin Dept. of Computer and Information Science, Soochow University, Taipei, Taiwan E-mail: sjyang@cis.scu.edu.tw

More information

A SURVEY ON RED QUEUE MECHANISM FOR REDUCE CONGESTION IN WIRELESS NETWORK

A SURVEY ON RED QUEUE MECHANISM FOR REDUCE CONGESTION IN WIRELESS NETWORK A SURVEY ON RED QUEUE MECHANISM FOR REDUCE CONGESTION IN WIRELESS NETWORK Kachhad Krishna Chandulal Department of Computer Engineering, Marwadi Education Foundation Faculty of PG Studies & Res. in Engg.

More information

Internet Protocols Fall Lecture 16 TCP Flavors, RED, ECN Andreas Terzis

Internet Protocols Fall Lecture 16 TCP Flavors, RED, ECN Andreas Terzis Internet Protocols Fall 2006 Lecture 16 TCP Flavors, RED, ECN Andreas Terzis Outline TCP congestion control Quick Review TCP flavors Impact of losses Cheating Router-based support RED ECN CS 349/Fall06

More information

A Simulation study : Performance comparison of AODV and DSR

A Simulation study : Performance comparison of AODV and DSR A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,

More information

Load Balancing in Mobile Ad-Hoc Networks: A Review

Load Balancing in Mobile Ad-Hoc Networks: A Review !"# $$%&!'$ ()***+ Load Balancing in Mobile Ad-Hoc Networks: A Review Dr.R.K Singh Dept of Electronics & Communication Engineering Uttrakhand Technical University Dehradun, India rksinghkec12@rediffmail.com

More information

MRED: An Algorithm to Insure High QoS in IP Networks

MRED: An Algorithm to Insure High QoS in IP Networks MRED: An Algorithm to Insure High QoS in IP Networks El-Bahlul Fgee 1, Adel Smeda 2, and Khadija AbouElgaseem 3 2 Department of Computer Science, High Institute of Vocational Studies, Yafren, Libya 1 Department

More information

MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS

MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS Harjinder Kaur CSE, GZSCCET, Dabwali Road, Bathinda, Punjab, India, sidhuharryab@gmail.com Gurpreet Singh Abstract CSE, GZSCCET, Dabwali

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Haowei Bai Honeywell Aerospace Mohammed Atiquzzaman School of Computer Science University of Oklahoma 1 Outline Introduction

More information

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Security Enhancement of AODV Protocol for Mobile Ad hoc Network Security Enhancement of AODV Protocol for Mobile Ad hoc Network Ms Darshana Patel 1, Ms Vandana Verma 2 1,2 RCEW, Jaipur, Rajasthan, India. ABSTRACT Here, authors presents a smart encryption algorithm

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

CONGESTION AWARE LINK COST ROUTING FOR MANETS

CONGESTION AWARE LINK COST ROUTING FOR MANETS CONGESTION AWARE LINK COST ROUTING FOR MANETS Tripti Sharma 1 and Dr. Vivek Kumar 2 1 IPEC, Ghaziabad, UP, India and 2 GKV, Haridwar, UK, India. ABSTRACT Due to the dynamic topology, self-configuration

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Chapter 6 Congestion Avoidance. Networking CS 3470, Section 1

Chapter 6 Congestion Avoidance. Networking CS 3470, Section 1 Chapter 6 Congestion Avoidance Networking CS 3470, Section 1 Congestion Avoidance TCP s strategy control congestion once it happens repeatedly increase load in an effort to find the point at which congestion

More information

Router s Queue Management

Router s Queue Management Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:

More information

Efficient Routing Algorithm for MANET using Grid FSR

Efficient Routing Algorithm for MANET using Grid FSR 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Efficient Routing Algorithm for MANET using Grid

More information

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

On the Deployment of AQM Algorithms in the Internet

On the Deployment of AQM Algorithms in the Internet On the Deployment of AQM Algorithms in the Internet PAWEL MROZOWSKI and ANDRZEJ CHYDZINSKI Silesian University of Technology Institute of Computer Sciences Akademicka 16, Gliwice POLAND pmrozo@go2.pl andrzej.chydzinski@polsl.pl

More information

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Md. Zulfikar Alom 1, Tapan Kumar Godder 2, Mohammad NayeemMorshed 3, Student Member, IEEE 1,2 Department of Information & Communication

More information

Multi-metrics based Congestion Control protocol in Wireless Sensor Network

Multi-metrics based Congestion Control protocol in Wireless Sensor Network e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Sowjanya Kumari Nalam¹, P.V.Venkateswara Rao ²,SrinadhSagiraju³ ¹M.Tech Student, CSE Department, Raghu Engineering

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 16: Congestion control II Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

COMPARATIVE PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET USING NS-2

COMPARATIVE PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET USING NS-2 COMPARATIVE PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET USING NS-2 Mr. Ashutosh Padubidri 1, Mr.Davesh Singh Manral 2, Mr.Nikhil Sharma 3, Ms.Amunaganti Anusha 4 1,2,3,4 BE students, Department

More information

The Uniformization Process of the Fast Congestion Notification (FN)

The Uniformization Process of the Fast Congestion Notification (FN) The Uniformization rocess of the Fast Congestion Notification (FN) Mohammed M. Kadhum InterNetWorks Research Group College of Arts and Sciences Universiti Utara Malaysia 06010 UUM Sintok, Malaysia kadhum@uum.edu.my

More information

Congestion Avoidance

Congestion Avoidance COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Congestion Avoidance Jasleen Kaur Fall 2016 1 Avoiding Congestion: Strategies TCP s strategy: congestion control Ø Control congestion once it occurs Repeatedly

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Improving Performance of Routing Protocols Using MRP Framework

Improving Performance of Routing Protocols Using MRP Framework Improving Performance of Routing Protocols Using MRP Framework Sohail Abid 1, Shahab Khan 2 1 Department of Engineering and Management Foundation University, Pakistan. 2 Department of Computing and Technology

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile

More information

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers Xiaowei Yang xwy@cs.duke.edu Overview More on TCP congestion control Theory Macroscopic behavior TCP

More information

A Review paper on Routing Protocol Comparison

A Review paper on Routing Protocol Comparison A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna

More information

A Modification to RED AQM for CIOQ Switches

A Modification to RED AQM for CIOQ Switches A Modification to RED AQM for CIOQ Switches Jay Kumar Sundararajan, Fang Zhao, Pamela Youssef-Massaad, Muriel Médard {jaykumar, zhaof, pmassaad, medard}@mit.edu Laboratory for Information and Decision

More information

British Journal of Science 37 June 2012, Vol. 5 (2)

British Journal of Science 37 June 2012, Vol. 5 (2) British Journal of Science 37 A Simulation Competition Study to Analyze and Evaluate the Performance of Five MANET Routing Protocols Assist Prof. Dr. Saad Talib Hasson and Ahmed Jawad kadhim College of

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

Adaptive RED: An Algorithm for Increasing the Robustness of RED s Active Queue Management or How I learned to stop worrying and love RED

Adaptive RED: An Algorithm for Increasing the Robustness of RED s Active Queue Management or How I learned to stop worrying and love RED Adaptive RED: An Algorithm for Increasing the Robustness of RED s Active Queue Management or How I learned to stop worrying and love RED! Presented by:! Frank Posluszny! Vishal Phirke 2/9/02 1 "Introduction

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network

Implementation of Quality of Services (QoS) for Based Wireless Mesh Network Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Improving Quality of Services of Ad Hoc Network by Working over Link Budgeting and Delay Elimination

Improving Quality of Services of Ad Hoc Network by Working over Link Budgeting and Delay Elimination Improving Quality of Services of Ad Hoc Network by Working over Link Budgeting and Delay Elimination Tanu Preet Singh Department of Computer Science & Engineering, Amritsar College of Engineering & Technology,

More information

The War Between Mice and Elephants

The War Between Mice and Elephants The War Between Mice and Elephants Liang Guo and Ibrahim Matta Computer Science Department Boston University 9th IEEE International Conference on Network Protocols (ICNP),, Riverside, CA, November 2001.

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks Abdulrahman Issa Kh Shybub 1, Tarek Mosbah Abdala 2 1, Computer Department Higher Institute

More information

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4 1 Research Scholar, Computer Science and Engineering, Lovely

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

EE 122: Router Support for Congestion Control: RED and Fair Queueing. Ion Stoica Oct. 30 Nov. 4, 2002

EE 122: Router Support for Congestion Control: RED and Fair Queueing. Ion Stoica Oct. 30 Nov. 4, 2002 EE 122: Router Support for Congestion Control: RED and Fair Queueing Ion Stoica Oct. 30 Nov. 4, 2002 Router Support For Congestion Management Traditional Internet - Congestion control mechanisms at end-systems,

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic in MANETs Tania Nagpal, Krishan Kumar M. Tech Research Scholar, Associate Professor SBS State Technical Campus, Ferozepur Punjab,

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks E. Suresh Babu P S V Srinivasa Rao M Srinivasa Rao C Nagaraju Assoc. Prof. of CSE K L University, Vijayawada.

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

Detection of Vampire Attack in Wireless Adhoc

Detection of Vampire Attack in Wireless Adhoc Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Improving Performance of Routing Protocols Using. MRP Framework

Improving Performance of Routing Protocols Using. MRP Framework Improving Performance of Routing Protocols Using MRP Framework Sohail Abid 1 Department of Engineering and Management Foundation University, Pakistan. rsohailabid@yahoo.com Shahab Khan 2 Department of

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SURVEY ON EXPLICIT FEEDBACK BASED CONGESTION CONTROL PROTOCOLS Nasim Ghasemi 1, Shahram Jamali 2 1 Department of

More information

On the Transition to a Low Latency TCP/IP Internet

On the Transition to a Low Latency TCP/IP Internet On the Transition to a Low Latency TCP/IP Internet Bartek Wydrowski and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks, EEE Department, The University of Melbourne,

More information

Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.

Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Comparative Study

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

A Congestion Avoidance Approach in Jumbo Frameenabled

A Congestion Avoidance Approach in Jumbo Frameenabled A Congestion Avoidance Approach in Jumbo Frameenabled IP Network Aos Anas Mulahuwaish, Kamalrulnizam Abu Bakar, Kayhan Zrar Ghafoor Faculty of Computer Science and Information System Universiti Teknologi

More information